Detection and Prevention of Sybil Attacks on Non- Stationary Nodes without Trusted Authority

  • Omarsharif Terdalkar
  • Prof. S. V Patil
Keywords: Ring Routing, RSSI Introduction

Abstract

—In a common remote sensor orchestrate, the batteries of the hubs near the sink deplete snappier than various centers in view of the data action concentrating towards the sink, abandoning it stranded and disturbing the sensor data reporting. To soothe this issue, versatile sinks are proposed. They positively give stack balanced data conveyance and accomplish uniform-vitality usage over the framework. On the other hand, publicizing the position of the adaptable sink to the framework introduces an overhead with respect to imperativeness use and package delays. In this paper, we propose Ring Routing, a novel, conveyed, vitality proficient portable sink steering convention, reasonable for time-delicate applications, which hopes to minimize this overhead while ensuring the advantages of versatile sinks. Furthermore, we assess the execution of Ring Routing by method for wide amusements. Each node sharing RSSI values to vet each other

References

[1] Yue Liu, David R. Bild, Member, IEEE, Robert P. Dick, Member, IEEE, Z. Morley Mao,and Dan S. Wallach “The Mason Test: A Defence Against Sybil Attacks in Wireless Networks. Without Trusted Authorities” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 11, NOVEMBER 2015 [2] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, Channel-based detection of Sybil attacks in wireless networks, IEEE Trans. Information Forensics and Security, vol. 4,no. 3, pp. 492503, Sept. 2009. [3] A. Haeberlen, E. Flannery, A. M. Ladd, A. Rudys, D. S.Wallach, and L. E. Kavraki, Practical robust localization over large-scale 802.11 wireless networks, in Proc. Int. Conf. Mobile Computing and Networking, Sept. 2004, pp. 7084. [4] D. B. Faria and D. R. Cheriton, Detecting identity-based attacks in wireless networks
using signal-prints, in Proc. Wkshp. Wireless Security, Sept. 2006, pp. 4352. [5] M. Demirbas and Y. Song, An RSSI-based scheme for Sybil attack detection in wireless sensor networks, in Proc. Int. Symp. on aWorld ofWireless, Mobile, and Multimedia, June 2006, pp. 564570. [6] S. Lv, X. Wang, X. Zhao, and X. Zhou, Detecting the Sybil attack cooperatively in wireless sensor networks, in Proc. Int. Conf. Computational Intelligence and Security, Dec. 2008, pp. 442446. [7] M. S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, Sybil nodes detection based on received strength variations within VANET, Int. J. Network Security, vol. 9, no. 1, pp. 2233, July 2009. [8] Y. Xiang, L. S. Bai, R. Piedrahita, R. P. Dick, Q. Lv, M. P. Hannigan, and L. Shang, Collaborative calibration and sensor placement for mobile sensor networks, in Proc. Int. Conf. Information Processing in Sensor Networks, Apr. 2012, pp. 7384.
Published
2018-01-22
How to Cite
Terdalkar, O., & Patil, P. S. (2018). Detection and Prevention of Sybil Attacks on Non- Stationary Nodes without Trusted Authority. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 3(3). Retrieved from http://asianssr.org/index.php/ajct/article/view/253
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.